A path traversal vulnerability was identified in Ray Dashboard (default port 8265) in Ray versions prior to 2.8.1. Due to improper validation and sanitization of user-supplied paths in the static file handling mechanism, an attacker can use traversal sequences (e.g., ../) to access files outside the intended static directory, resulting in local file disclosure.
References
| Link | Resource |
|---|---|
| https://github.com/ray-project/ray | Product |
| https://packetstorm.news/files/id/215801/ | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure | Third Party Advisory |
Configurations
History
19 Mar 2026, 19:25
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:anyscale:ray:*:*:*:*:*:*:*:* | |
| References | () https://github.com/ray-project/ray - Product | |
| References | () https://packetstorm.news/files/id/215801/ - Exploit, Third Party Advisory | |
| References | () https://www.vulncheck.com/advisories/ray-dashboard-path-traversal-leading-to-local-file-disclosure - Third Party Advisory | |
| First Time |
Anyscale
Anyscale ray |
18 Mar 2026, 14:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
17 Mar 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-17 20:16
Updated : 2026-03-19 19:25
NVD link : CVE-2026-32981
Mitre link : CVE-2026-32981
CVE.ORG link : CVE-2026-32981
JSON object : View
Products Affected
anyscale
- ray
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
